Description
Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
Published: 2016-04-21
Score: 9.8 Critical
EPSS: 94.0% High
KEV: Yes
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-451-1 openjdk-7 security update
Debian DSA Debian DSA DSA-3558-1 openjdk-7 security update
Ubuntu USN Ubuntu USN USN-2963-1 OpenJDK 8 vulnerabilities
Ubuntu USN Ubuntu USN USN-2964-1 OpenJDK 7 vulnerabilities
Ubuntu USN Ubuntu USN USN-2972-1 OpenJDK 6 vulnerabilities
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0650.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0651.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0675.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0676.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0677.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0678.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0679.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0701.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0702.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0708.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0716.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0723.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-1039.html cve-icon cve-icon
http://www.debian.org/security/2016/dsa-3558 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2020/08/31/1 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixJAVA cve-icon
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html cve-icon cve-icon
http://www.securityfocus.com/bid/86421 cve-icon cve-icon
http://www.securitytracker.com/id/1035596 cve-icon cve-icon
http://www.securitytracker.com/id/1037331 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2963-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2964-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2972-1 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2016:1430 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:1216 cve-icon cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10159 cve-icon cve-icon
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r5f48b16573a11fdf0b557cc3d1d71423ecde8ee771c29f32334fa948%40%3Cdev.cassandra.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rc3abf40b06c511d5693baf707d6444bf7745e6a1e343e6f530a12258%40%3Cuser.cassandra.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2016-3427 cve-icon
https://security.gentoo.org/glsa/201606-18 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20160420-0001/ cve-icon cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3427 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2016-3427 cve-icon
History

Wed, 22 Oct 2025 00:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Tue, 08 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics kev

{'dateAdded': '2023-05-12'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 Aug 2024 00:00:00 +0000

Type Values Removed Values Added
References

Subscriptions

Apache Cassandra
Canonical Ubuntu Linux
Debian Debian Linux
Netapp E-series Santricity Management Plug-ins E-series Santricity Storage Manager E-series Santricity Web Services Oncommand Balance Oncommand Cloud Manager Oncommand Insight Oncommand Performance Manager Oncommand Report Oncommand Shift Oncommand Unified Manager Oncommand Workflow Automation Storagegrid Vasa Provider For Clustered Data Ontap Virtual Storage Console
Opensuse Leap Opensuse
Oracle Jdk Jre Jrockit Linux
Redhat Enterprise Linux Enterprise Linux Desktop Enterprise Linux Eus Enterprise Linux Server Enterprise Linux Server Aus Enterprise Linux Server Eus Enterprise Linux Server Tus Enterprise Linux Workstation Network Satellite Rhel Extras Rhel Extras Oracle Java Satellite
Suse Linux Enterprise Desktop Linux Enterprise Module For Legacy Linux Enterprise Server Linux Enterprise Software Development Kit Manager Manager Proxy Openstack Cloud
cve-icon MITRE

Status: PUBLISHED

Assigner: oracle

Published:

Updated: 2025-10-21T23:55:53.262Z

Reserved: 2016-03-17T00:00:00.000Z

Link: CVE-2016-3427

cve-icon Vulnrichment

Updated: 2024-08-05T23:56:14.120Z

cve-icon NVD

Status : Deferred

Published: 2016-04-21T11:00:21.667

Modified: 2025-10-22T00:15:51.247

Link: CVE-2016-3427

cve-icon Redhat

Severity : Critical

Publid Date: 2016-04-19T00:00:00Z

Links: CVE-2016-3427 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses